![]() ![]() Our FAQ covers common questions about spoofing relevance. Please download our Spoofer Project Brochure to learn how you can help protect your network, your customers and the Internet. ![]() The test results will allow us to analyze characteristics of networks deploying source address validation (e.g., network location, business type). The system measures different types of forged addresses, including private and neighboring addresses. We are (in the process of) producing reports and visualizations that will inform operators, response teams, and policy analysts. We have developed and support a new client-server system for Windows, MacOS, and UNIX-like systems that periodically tests a network's ability to both send and receive packets with forged source IP addresses (spoofed packets). This project includes applied research, software development, new data analytics, systems integration, operations and maintenance, and an interactive analysis and reporting service. Seeking to minimize Internet's susceptibility to spoofed DDoS attacks, we are developing and supporting open-source software tools to assess and report on the deployment of source address validation (SAV) best anti-spoofing practices. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |